General
-
Target
f9dfaeff5fd22709b5cd29cb23c6f7c81f392f3a2d88c2bcf09fb4b599fb6f30
-
Size
93KB
-
Sample
241017-wndqhs1cjj
-
MD5
97266b25a791e68493ea2563306c7cf0
-
SHA1
d161fff47235e7d60209b6feae74019e6d000297
-
SHA256
f9dfaeff5fd22709b5cd29cb23c6f7c81f392f3a2d88c2bcf09fb4b599fb6f30
-
SHA512
9eac60682d5ce4398dfd45449fde4272cba942fa01afe7034ef0b1393605f7a65997a52c9ae960d87d973dab1c9c2f0dfa339ae921470664f241a71cc9d82d09
-
SSDEEP
1536:cumC+xhUa9urgOB9mNvM4jEwzGi1dDZDLgS:cugUa9urgOidGi1dtE
Behavioral task
behavioral1
Sample
f9dfaeff5fd22709b5cd29cb23c6f7c81f392f3a2d88c2bcf09fb4b599fb6f30.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f9dfaeff5fd22709b5cd29cb23c6f7c81f392f3a2d88c2bcf09fb4b599fb6f30.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
njrat
0.7d
HacKed
hakim32.ddns.net:2000
susiahat24199a.ddns.net:5552
a8f08fa23dbc544d76787e679872404a
-
reg_key
a8f08fa23dbc544d76787e679872404a
-
splitter
|'|'|
Targets
-
-
Target
f9dfaeff5fd22709b5cd29cb23c6f7c81f392f3a2d88c2bcf09fb4b599fb6f30
-
Size
93KB
-
MD5
97266b25a791e68493ea2563306c7cf0
-
SHA1
d161fff47235e7d60209b6feae74019e6d000297
-
SHA256
f9dfaeff5fd22709b5cd29cb23c6f7c81f392f3a2d88c2bcf09fb4b599fb6f30
-
SHA512
9eac60682d5ce4398dfd45449fde4272cba942fa01afe7034ef0b1393605f7a65997a52c9ae960d87d973dab1c9c2f0dfa339ae921470664f241a71cc9d82d09
-
SSDEEP
1536:cumC+xhUa9urgOB9mNvM4jEwzGi1dDZDLgS:cugUa9urgOidGi1dtE
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1